Saviynt
Saviynt16d ago

SOC L3 Analyst (Cloud Security Monitoring)

Bengaluru,Bangalorelead
SecurityOtherAnalystSoc AnalystCybersecurity
0 views0 saves0 applied

Quick Summary

Overview

Saviynt's AI-powered identity platform manages and governs human and non-human access to all of an organization's applications, data, and business processes.

Technical Tools
SecurityOtherAnalystSoc AnalystCybersecurity
Saviynt's AI-powered identity platform manages and governs human and non-human access to all of an organization's applications, data, and business processes. Customers trust Saviynt to safeguard their digital assets, drive operational efficiency, and reduce compliance costs. Built for the AI age, Saviynt is today helping organizations safely accelerate their deployment and usage of AI. Saviynt is recognized as the leader in identity security, with solutions that protect and empower the world’s leading brands, Fortune 500 companies and government institutions. For more information, please visit www.saviynt.com.

We are building a next-generation Security Operations Center (SOC) designed for the cloud-first era. We believe that effective security operations must evolve beyond traditional reactive methods. We are building an intelligent, automated SOC that combines deep cloud security expertise with robust automation to predict, prevent, and neutralize advanced threats faster than
ever.
We are seeking an L3 SOC Analyst - Cloud & Automation to serve as a senior technical expert and escalation point within our SOC. This role is for a hands-on-keyboard expert who thrives on hunting for advanced threats, automating responses, and mentoring junior analysts. You will be a key player in handling complex incidents, particularly those involving cloud environments, and
will be responsible for building and tuning the automation that allows our team to scale.
 
 
Advanced Threat Response & Escalation
● Serve as the final technical escalation point for complex security incidents escalated from L1/L2 analysts.
● Conduct in-depth forensic analysis of compromised systems, kubernetes containers, malware, and network traffic to determine the full scope of an incident (root cause,
impact, remediation).
● Lead the response to high-severity security incidents, especially those originating in or targeting our cloud infrastructure (AWS, Azure).
● Analyze and correlate data from diverse sources (e.g., SIEM, EDR, CSPM, cloud-native logs) to uncover sophisticated attack patterns.

Security Automation & Orchestration
● Design, build, and maintain automated response playbooks in our SOAR platform to handle high-volume alerts and repetitive tasks.
● Develop and maintain custom AI agents to automate evidence collection, alert enrichment, and containment actions.
● Integrate security tools (EDR, SIEM, Cloud Security tools) via APIs to create seamless,
automated workflows.
● Continuously identify and implement new automation opportunities to reduce Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR).
 
Proactive Threat Hunting & Cloud Security
● Proactively hunt for undetected threats across our enterprise and cloud environments using hypothesis-driven and intelligence-driven methods.
● Act as a Subject Matter Expert (SME) for cloud security monitoring, utilizing native tools like AWS GuardDuty, CloudTrail, CrowdStrike, Proofpoint,etc.
● Develop and tune advanced detection rules, SIEM correlation searches, and EDR queries based on new threat intelligence, hunting findings, and MITRE ATT&CK tactics.

Mentorship & Continuous Improvement
● Mentor and provide technical guidance to L1 and L2 analysts, helping to build their analytical and technical skills.
● Create and refine SOC documentation, including standard operating procedures (SOPs), runbooks, and incident response plans.
● Analyze incident trends and automation metrics to provide recommendations for improving security posture, detection logic, and playbook effectiveness.
 
 
● Bachelor’s degree in Computer Science, Information Security, or a related field.
● 6-10 years of experience in a Security Operations (SOC) environment, with at least 4 years in a senior analyst, threat hunter, or L2/L3 role.
● Strong Cloud Security Skills: Deep, hands-on experience with security monitoring and incident response in at least one major cloud provider (AWS, Azure, or GCP).
● Strong Automation & AI Skills: Proven ability to write scripts for automation with an ability to implement AI based automations for SOC use cases.
● Technical Expertise: Hands-on experience with SOAR platforms (e.g., CrowdStrike Fusion, Splunk SOAR) and SIEMs (e.g., Splunk, QRadar, CrowdStrike Falcon).
● Deep understanding of modern EDR solutions, container security, and host/system.
● Expert-level knowledge of the MITRE ATT&CK framework and its application to threat hunting and detection engineering.
● Be at the forefront of a modern, cloud-focused Security Operations Center.
● Drive the automation strategy that defines how our SOC operates and scales.
● Work with cutting-edge cloud-native security, automation, and threat intelligence technologies.
● Collaborate with world-class security and engineering leaders in a high-impact, hands-on role.

Location & Eligibility

Where is the job
Bengaluru
Hybrid — some on-site time required
Who can apply
Same as job location
Listed under
Worldwide

Listing Details

Posted
April 12, 2026
First seen
April 13, 2026
Last seen
April 29, 2026

Posting Health

Days active
15
Repost count
0
Trust Level
38%
Scored at
April 29, 2026

Signal breakdown

freshnesssource trustcontent trustemployer trust
Saviynt
Saviynt
lever

Saviynt is a leading provider of cloud-native identity and governance platform solutions, empowering enterprises to secure their digital transformation, safeguard critical assets, and meet regulatory compliance.

Employees
3k+
Founded
2010
View company profile
Newsletter

Stay ahead of the market

Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.

A
B
C
D
Join 12,000+ marketers

No spam. Unsubscribe at any time.

SaviyntSOC L3 Analyst (Cloud Security Monitoring)